Security reflects a permanent and complex movement that complies with international and societal needs and developments in all its dimensions, interactions and levels. To constitute a universal demand for all States, communities and individuals. The question of security is one of the most important motivations and motivations that govern the behavior, and even the objectives of those societies and States. These groups or individuals have always sought to avoid fear and harm, and to provide stability, safety and security. In the light of this, security studies have been among the important fields of study in the field of international and strategic relations. The field witnessed many theoretical efforts, from the traditional perspective, which limited understanding of specific dimensions, to the renaissance of this field during the Cold War era, And the emergence of a new environment with new interactions whose demands, structures and needs differ from past periods, to produce new concepts that adapt and respond to this environment. One of the most prominent of these adaptations was the shift in levels of interest in security studies from the states To individuals and to meet the needs of this environment and its data, including the emergence of the concept of human security, which was consistent in his movement with the concept of national security
Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo
The aim of this study is to shed light on the importance of biofuels as an alternative to conventional energy, in addition to the importance of preserving agricultural crops, which are the main source of this fuel, to maintain food security, especially in developing countries. The increase in global oil prices, in addition to the fear of global warming, are among the main factors that draw the world’s attention to searching for alternative sources of traditional energy, which are sustainable on the one hand, and on the other hand reduce carbon emissions. Therefore, the volume of global investment in renewable energy in general, and in liquid biofuels and biomass in particular, has increased. Global fears emerged that the excessive convers
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreThe insurance companies are one of the organizations that rely mainly on human capital to underwriting to insurable risks because most of risks have many variables, so the aim of the research is to show the level of interest of the researched company in human capital, the reality of the underwriting policy in it, and the relationships of correlation and effect between them, and the approach has been used Analytical descriptive, as books, research and other related sources were used for the purpose of completing the theoretical side, on the practical side, a questionnaire was prepared, which represents the main tool for collecting data and distributed to a random sample of 64 people from underwriting managers and employees in spec
... Show MoreThe research aims to examine the effect of KUD strategy on acquiring the grammatical concepts among intermediate school students. To achieve the research objective, the researcher adopted the null hypothesis in which there is no statistically significant difference at the level (0.05) between the average scores of students of the experimental group who study grammar base on the KUD strategy and the average scores of the control group who study the grammar through the traditional way of acquiring grammatical concepts. In a random manner, the researcher selected the research sample from one of Baghdad’s education schools in al Rusafa / 2, as the total number of students of the two groups reached (67) students. They were divided into (33)
... Show MoreTitle: Arabic Manuscript, Concepts and Terms and Their Impact on Determining Its Historical beginnings and extension of its existence.
Researcher: Dr. Atallah Madb Hammadi Zubaie.
Bn the name of Allah Most Merciful
The interest in manuscripts and rules of their investigation and dissemination appeared soon, and the speech in editing terms and concepts appeared in sooner time. When looking at the classified books in the Arab manuscripts , we find the books of the first generation did not allude definition for this term , but rather focused on the importance of manuscripts and their existence locations, indexing, care, and verification rules. The reason for this is that the science of Arabic manuscrip
... Show MoreCryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o
... Show MoreNetwork security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed
The research aims to find out the effect of PEDODE Strategy on the acquisition of historical concepts of First Intermediate Grade. To achieve this goal, the researcher has put forward this zero hypothesis: There is no statistically significant difference at the level of (05,0) between the mean of the students' marks in the experimental group who study the history subject using PEDODE strategy and that of the students' marks in the control group who study the subject according to the traditional method in the post-testing on the acquisition of historical concepts. The sample of the study consists of (62 female-students) of First Intermediate Grade in the Directorate of Baghdad Education/ Karkh2nd for the academic year 2016-2017. The sampl
... Show More